Resourcing the Metaverse (+ Feedback aaS)
cloud203018 Maalis 2022

Resourcing the Metaverse (+ Feedback aaS)

What resources does the Metaverse require? In this episode, we think of the metaverse as a distributed environment and ask if it could be owned by the people who are hosting the environments instead of centralized. One of the complicating factors is figuring out if the Metaverse is AR, VR, augmented or virtual systems. Consensus was that the augmented reality (AR) version of the Metaverse is probably the most valuable and the most accessible for building these systems out. But we kept mixing physical assets and intellectual property assets: the virtual furniture, environments, decorations and things that you would actually put in the virtual environment. While the infrastructure and software that will run the Metaverse is more necessary, the real estate is also interesting. Stay tuned for a bonus at 48 minutes where we had a good discussion about testing products and giving product feedback as a service Transcript: https://otter.ai/u/OhEqaGrH4S2Y9ywpTKVgrhhAn0Y Image: https://www.pexels.com/photo/room-chair-lot-356065/

Jaksot(500)

Advanced SSH [TechOps]

Advanced SSH [TechOps]

SSH and Secure Shell is one of those topics that people take for granted because it is a ubiquitous way to log in and access systems. True to form for the TechOps series, though, we break that down in...

6 Syys 202450min

High Availability [TechOps Series]

High Availability [TechOps Series]

Is high availability always a good thing? Today our discussion takes an operations perspective. We look at places where you were over or under committing high availability, where you were confusing di...

30 Elo 202447min

AI And Digital Twins

AI And Digital Twins

We dive into AI, manufacturing and how to improve manufacturing outcomes by better analyzing data. If you are interested in manufacturing or advanced applications of AI and digital twins - which is ...

23 Elo 20241h 1min

UEFI Trust & Secure Boot Issue

UEFI Trust & Secure Boot Issue

We explore the UEFI certificate issue in which secure boot is potentially compromised. Certificates that are included in most UEFI BIOSes have been compromised in ways that could easily be used as an ...

16 Elo 202445min

AI Platform Consolidation & Walled Gardens

AI Platform Consolidation & Walled Gardens

We discuss the impact AI and data sovereignty data protection will have on platforms, consolidated management of your data like in Office by Microsoft or Google, on premises, and systems. This include...

10 Elo 202450min

Two But Rule by John Wolpert [Book Discussion]

Two But Rule by John Wolpert [Book Discussion]

This episode is one of our book club episodes starring John Walpole, who wrote the Two But Rule, which is very tongue in cheek while also very serious about momentum thinking and using a negative boun...

8 Elo 202452min

Crowd Strike vs Operations Responsibility

Crowd Strike vs Operations Responsibility

This episode explores the intersection of infrastructure automation and security through the lens of the Crowd Strike outage. We'll discuss the tension between maintaining stable, reliable data center...

2 Elo 202451min

Containers And Walled Gardens

Containers And Walled Gardens

We start talking about walled gardens and the momentum and push that causes us to get into vendor active environments in this episode. This is going to be a multi-part discussion where we look at the ...

27 Heinä 202432min